关注
Jun Zhang
标题
引用次数
引用次数
年份
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
4852016
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
PB Lowry, J Zhang, T Wu
Computers in Human Behavior 68, 104-120, 2017
1262017
An integrative theory addressing cyberharassment in the light of technology-based opportunism
PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu
Journal of Management Information Systems 36 (4), 1142-1178, 2019
682019
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
D Wu, GD Moody, J Zhang, PB Lowry
Information & Management 57 (5), 103235, 2020
672020
Understanding and predicting cyberstalking in social media: Integrating theoretical perspectives on shame, neutralization, self-control, rational choice, and social learning
PB Lowry, J Zhang, C Wang, T Wu, M Siponen
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
192013
Designing quantified-self 2.0 running platform to ensure physical activity maintenance: the role of achievement goals and achievement motivational affordance
J Zhang, PB Lowry
20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi …, 2016
172016
Understanding the disclosure of private healthcare information within online quantified self 2.0 platforms
J Zhang, V Dibia, A Sodnomov, PB Lowry
19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015
152015
Explaining the outcomes of social gamification: A longitudinal field experiment
J Zhang, Q Jiang, W Zhang, L Kang, PB Lowry, X Zhang
Journal of Management Information Systems 40 (2), 401-439, 2023
132023
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging
C Wang, J Zhang, MKO Lee
Information Technology & People 35 (7), 2167-2192, 2022
92022
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective
J Zhang, PB Lowry
Journal of the Association for Information Systems Theory Development …, 2015
52015
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks
D Wu, J Zhang, N Brown, PB Lowry, GD Moody
22020
Validating a Control-Based Model of Information Security Policy Compliance-A Meta-Analysis.
J Liu, J Zhang, J Zhang
ICIS, 2019
22019
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress
J Zhang, Q Jiang, PB Lowry, Y Li
22018
How external monitoring can mitigate cyberloafing: understanding the mediating and moderating roles of employees’ self-control
H Jiang, J Zhang, X Zheng
Behaviour & Information Technology 43 (11), 2473-2487, 2024
12024
Promoting exercise behavior with monetary and social incentives: An empirical study based on an online fitness program
Z Zhang, J Zhang, B Zheng, J Zhang
JUSTC 52 (10), 4-1-4-11, 2022
12022
The Role of Psychological Ownership in Privacy Risk Compensation: A Moderated Mediation Model
L Wang, J Zhang, J Zhang, Z Xiabing
2022
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?
J Zhang, D Wu, N Brown, PB Lowry, GD Moody
2020
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach
J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry
2018
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary
C Wang, J Zhang
2018
系统目前无法执行此操作,请稍后再试。
文章 1–19